Filters








140 Hits in 4.3 sec

Generic non-repudiation protocols supporting transparent off-line TTP

Guilin Wang, Jianying Zhou, Meng-Chow Kang
2006 Journal of Computer Security  
In this paper, we first argue that it is really meaningful in practice to exploit generic fair nonrepudiation protocols with transparent off-line trusted third party (TTP).  ...  Namely, in those protocols, each involved party could use any secure digital signature algorithm to produce non-repudiation evidences; and the issued evidences are the same regardless of whether the TTP  ...  Acknowledgements The author would like to thank all anonymous referees, on behalf of IWAP 2005 and Journal of Computer Security, for their very helpful and detailed comments on the protocol, as well as  ... 
doi:10.3233/jcs-2006-14504 fatcat:dmaz2qryrffnfimoyv6d5grise

Preface

Jianying Zhou, Meng-Chow Kang, Jianying Zhou, Meng-Chow Kang
2006 Journal of Computer Security  
The workshop had one keynote speech and six technical sessions, covering the topics of PKI Operation & Case Study, Non-repudiation, Authorization & Access Control, Authentication & Time-Stamping, Certificate  ...  We would like to thank general chairs Feng Bao and Hwee-Hwa Pang for their support and encouragement, and the local organizing team for their dedication and hard work for making the workshop and this publication  ...  The third paper is "Generic Non-Repudiation Protocols Supporting Transparent Off-line TTP" by Guilin Wang.  ... 
doi:10.3233/jcs-2006-14501 fatcat:ksrzlwypdngxtmozjilfpzfjhi

Generic, Optimistic, and Efficient Schemes for Fair Certified Email Delivery [chapter]

Guilin Wang, Feng Bao, Kenji Imamoto, Kouichi Sakurai
2005 Lecture Notes in Computer Science  
Then, we present two generic optimistic certified email schemes with transparent TTP.  ...  Our schemes are not only fair, but also support timeliness in two flavors: one scheme supports weak timeliness but with stateless TTP, while the other guarantees (strong) timeliness though only supports  ...  Specifically, our schemes overcome the security shortcoming in schemes [9, 14] ; support transparent TTP while the schemes in [10, 12] do not; provide evidences for non-repudiation of origin while the  ... 
doi:10.1007/11602897_4 fatcat:74ij6dxivnh2llbf2hsjmrcnbq

Certified electronic mail: Properties revisited

Josep Lluis Ferrer-Gomilla, Jose A. Onieva, Magdalena Payeras, Javier Lopez
2010 Computers & security  
We could, thus, recall the following definitions related to non-repudiation protocols: Definition 2 (Non-repudiation of Origin NRO).  ...  A protocol provides a non-repudiation of origin service if, and only if, it generates evidence of origin which will allow the recipient to demonstrate to an arbiter whether the originator was or not the  ...  A TTP is said to be on-line if it acts in all protocol executions. Definition 13 (Off-line TTP).  ... 
doi:10.1016/j.cose.2009.06.009 fatcat:nao36kvzubdtdbivaq777aaonu

Multiparty nonrepudiation

Jose A. Onieva, Jianying Zhou, Javier Lopez
2008 ACM Computing Surveys  
Then it describes the general multiparty non-repudiation problem, and analyzes the state-of-the-art mechanisms.  ...  Actually, it represents the core of a non-repudiation protocol. It is greatly influenced by the communication channel properties.  ...  A TTP may also generate and provide supporting evidence in a non-repudiation service.  ... 
doi:10.1145/1456650.1456655 fatcat:ygzho6mlevdjpagztwgvezv5r4

D2.4 - Transparency and Compliance Algorithms V1

Sabrina Kirrane, Piero Bonatti, Javier D. Fernández, Clemente Galdi, Luigi Sauro
2018 Zenodo  
and aggregated data based on the user context, on top of the designed transparency framework (T2.3).  ...  Development of transparency and compliance algorithms (T2.4) to assure that any data processing is inline with the policies and the legislation (T2.1, T2.2), and to provide synthesis of policies for mined  ...  Classification based on TTP and optimistic protocols Fair Exchange protocols with TTP can be essentially classified as on-line/in-line and off-line (or optimistic) protocols.  ... 
doi:10.5281/zenodo.2549586 fatcat:uacsjwmyy5abdczqkvmbp6bn6u

An intensive survey of fair non-repudiation protocols

Steve Kremer, Olivier Markowitch, Jianying Zhou
2002 Computer Communications  
Therefore a fair non-repudiation protocol has to generate non-repudiation of origin evidences intended to Bob, and non-repudiation of receipt evidences destined to Alice.  ...  In this paper, we clearly define the properties a fair non-repudiation protocol must respect, and give a survey of the most important non-repudiation protocols without and with trusted third party (TTP  ...  This approach, using an off-line TTP, is also called the optimistic approach.  ... 
doi:10.1016/s0140-3664(02)00049-x fatcat:xj4uk6iig5cr7b7hc5cyct5u7q

Component middleware to support non-repudiable service interactions

N. Cook, P. Robinson, S. Shrivastava
2004 International Conference on Dependable Systems and Networks, 2004  
The paper describes how component based middleware can be enhanced to support non-repudiable service invocation and information sharing.  ...  A generic implementation, based on a J2EE application server, is presented.  ...  Furthermore, no TTP is used to support protocol execution.  ... 
doi:10.1109/dsn.2004.1311931 dblp:conf/dsn/CookRS04 fatcat:icclfmclpzge3hevmnslcsnjd4

Risk Balance in Optimistic Non-repudiation Protocols [chapter]

Mohammad Torabi Dashti, Jan Cederquist, Yanjing Wang
2012 Lecture Notes in Computer Science  
We investigate how the behaviors of malicious trusted parties affect participants of optimistic non-repudiation protocols. We introduce a notion of risk balance for exchange protocols.  ...  As a case study, we investigate the consequences of malicious behaviors of trusted parties in the context of two fair non-repudiation protocols, proposed by Gürgens, Rudolph and Vogt (2005) .  ...  An off-line trusted third party (TTP) supervises the exchanges. If the participants correctly follow the protocol, the TTP does not intervene in the exchange.  ... 
doi:10.1007/978-3-642-29420-4_17 fatcat:lziwxqcsk5ck3bd5gtztlkabya

D2.8 Transparency and Compliance Algorithms V2

Sabrina Kirrane, Piero Bonatti, Javier D. Fernández, Clemente Galdi, Luigi Sauro, Daniele Dell'Erba, Iliana Petrova, Ida Siahaan
2018 Zenodo  
processing and sharing requirements in Chapter 2; (iii) how we can leverage the Big Data Europe engine for semantic data processing on large-scale RDF data in Chapter 3; and (iv) the guarantees in term of non-repudiation  ...  that could be provided by existing fair exchange protocols in Chapter 4.  ...  Classification based on TTP and optimistic protocols Fair Exchange protocols with TTP can be essentially classified as on-line/in-line and off-line (or optimistic) protocols.  ... 
doi:10.5281/zenodo.4585644 fatcat:xrllgyqfgrdwdcg25dsnfr254u

Avoiding loss of fairness owing to failures in fair data exchange systems

Peng Liu, Peng Ning, Sushil Jajodia
2001 Decision Support Systems  
However, the correctness fairness of the existing fair exchange protocols that use a Trusted Third Party TTP is based on the assumption that during an exchange there are no failures at any of the local  ...  This paper points out that 1 system failures may cause loss of fairness, and 2 most of the existing fair exchange protocols that use a TTP cannot ensure fairness in presence of system failures.  ...  Consider the following fair non-repudiation protocol, w x which is adapted from Ref. 18 , an efficient non-repudiation protocol that can ensure fairness when there are no system failures.  ... 
doi:10.1016/s0167-9236(00)00141-x fatcat:7abk4ojotfc6vjurq4imxdsr6a

Securing The Electronic Market: The KEYSTONE Public Key Infrastructure Architecture

Stefanos Gritzalis, Sokratis K Katsikas, Dimitrios Lekkas, Konstantinos Moulinos, Eleni Polydorou
2000 Computers & security  
The proposed PKI architecture guarantees openness, scalability, flexibility, extensibility, integration with existing TTP and information infrastructure, transparency and, above all, security.Thus, it  ...  Functions supporting this service are responsible for camouflaging online as well off-line communications. 11 .Authorization.  ...  Non-repudiation.  ... 
doi:10.1016/s0167-4048(00)08022-6 fatcat:kbbw75pw5faefhru5lmvqgi6x4

Transparent Personal Data Processing: The Road Ahead [chapter]

Piero Bonatti, Sabrina Kirrane, Axel Polleres, Rigo Wenning
2017 Lecture Notes in Computer Science  
The European General Data Protection Regulation defines a set of obligations for personal data controllers and processors.  ...  At the core of any transparency architecture is the logging of events in relation to the processing and sharing of personal data.  ...  Supported by the European Union's Horizon 2020 research and innovation programme under grant 731601.  ... 
doi:10.1007/978-3-319-66284-8_28 fatcat:n7ea73jigvdazkgbr3buhykot4

D1.7 - Policy, transparency and compliance guidelines V2

Piero Bonatti, Sabrina Kirrane, Rigo Wenning, Philip Raschke
2018 Zenodo  
This document includes details on the policy and transparency considerations of the use case, and the compliance requirements against policies (T1.3).  ...  U P Y Y Y Y N General [52] ON R S Y Y Y Y Y Y Payments [15] OFF O S N N N Y Y Y N General [16] OFF O S/P N N N Y Y Y N General Schematic representation • NRO: Non-repudiation of origin • NRR: Non-repudiation  ...  For each paper, we specify the following: • TTP: TTP involvement. On-line, Off-line, NO TTP, INline.  ... 
doi:10.5281/zenodo.2549549 fatcat:5xwvoijxubb7xg4xerjdtekjq4

A security architecture for TMN inter-domain management [chapter]

Francois Gagnon, Dominique Maillot, Jon Ølnes, Lars Hofseth, Lionel Sacks
1994 Lecture Notes in Computer Science  
Non-Repudiation Non-repudiation consists of the following facilities: generation of evidence, recording of evidence, verification of generated evidence, retrieval of the evidence, re-verification of the  ...  Strong non-repudiation may only be attained by asymmetric cryptographic mechanisms or use of a TTP.  ... 
doi:10.1007/3-540-63135-6_40 fatcat:lwbq7t2vibg2rldzmddyfy4fay
« Previous Showing results 1 — 15 out of 140 results